A network architect is designing a remote access solution for mobile workers with laptop computers and will use GPRS technology for over-the-air communications. Because workers access sensitive information, what protection is required to protect GPRS traffic?
a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.
b. GPRS’s over-the-air encryption has been compromised and a VPN is needed.
c. GPRS has no over-the-air encryption and a VPN is needed.
d. GPRS is not suitable for Internet communications and should not be used.
a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.
You might also like to view...
__________ is not a desirable characteristic of a successful migration strategy.
a) Transparency b) Scalability c) Residual dependency d) Fault tolerance
Which of the following is NOT true in relation to digital rights management (DRM)?
A) It imposes restrictions on the use of files. B) It can be found on files such as music, eBooks, and videos. C) It is a technology applied to digital media files. D) It can legally be removed from a file.
What is the physical rate of transmission of a T1 leased line?
A) 10 Mbps B) 100 Mbps C) 44.455 Mbps D) 1.544 Mbps E) 2 Mbps F) 5.455 Mbps
Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)
A) MP3 player B) Laptop computer C) Palm III PDA D) Cell phone